cybercrime
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Chinese hackers infiltrated US Chamber of Commerce
The computer systems of the US Chamber of Commerce, a lobbying group that represents the interest of US businesses and trade organizations, have been infiltrated by hackers. …
Visa probes into potential card processor security breach
Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
The rise of social media abuse and mobile malware
IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …
12 hacking groups are behind most Chinese cyber attacks
Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security …
Pros losing confidence in hard tokens
Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …
2012 network security trends
Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …
Proactive detection of cyber security incidents
ENISA today launched a report which identifies 16 shortcomings in detection of network security incidents. The report reveals that not all available tools are used widely …
Fraudsters beat two-factor authentication, steal $45k
It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …
U.S. wakes up to cybercrime threat
Businesses in the U.S. are increasingly waking up to the threat of cyber crime according to the latest Lloyd’s Risk Index, but evidence shows the problem of cyber crime …
Featured news
Resources
Don't miss
- Balancing proprietary and open-source tools in cyber threat research
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management